General
-
Target
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515
-
Size
336KB
-
Sample
220707-z28plaeah7
-
MD5
2c213eac311b385bba88f42c04a5ba73
-
SHA1
eb1ef4ab7662e500b0641fd9a1850b30da181908
-
SHA256
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515
-
SHA512
f03e8a10e1054312a2ef18e374b97f2d28fa28ba470bfafa1c6a5026c87e08c3e6eab7914fec0da8255c5246614068c61450e921760a48c7c5c6b378ebe13c74
Static task
static1
Behavioral task
behavioral1
Sample
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\Recovery+wdkkx.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5D2512473AEA1D2
http://tes543berda73i48fsdfsd.keratadze.at/5D2512473AEA1D2
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/5D2512473AEA1D2
http://xlowfznrg4wf7dli.ONION/5D2512473AEA1D2
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\Recovery+wxcqu.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/658C1DEAC379D11
http://tes543berda73i48fsdfsd.keratadze.at/658C1DEAC379D11
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/658C1DEAC379D11
http://xlowfznrg4wf7dli.ONION/658C1DEAC379D11
Targets
-
-
Target
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515
-
Size
336KB
-
MD5
2c213eac311b385bba88f42c04a5ba73
-
SHA1
eb1ef4ab7662e500b0641fd9a1850b30da181908
-
SHA256
43f7c5f99bc4f8e92f8e9fe6ad6bbcb13aa996cb3057fa2e509ec564d1b5b515
-
SHA512
f03e8a10e1054312a2ef18e374b97f2d28fa28ba470bfafa1c6a5026c87e08c3e6eab7914fec0da8255c5246614068c61450e921760a48c7c5c6b378ebe13c74
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-